Mark Wilson markw@rsmpartners.com Session Details: The Introduction



Similar documents
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: l Disclaimer.

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. (312) KRI

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT

Our Vulnerability Scanning Program

Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask!

Top Ten Security Vulnerabilities in z/os Security

21 Things You Didn t Used to Know About RACF

The Security Gap. Philip Young aka Soldier of

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security Audit. Vulnerability Assessment (VA)

How to Secure Mainframe FTP

Understanding Security Testing

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Goals. Understanding security testing

A Decision Maker s Guide to Securing an IT Infrastructure

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Information Security

Application Security in the Software Development Lifecycle

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation

CA Auditor for z/os. System Review Checklist. r12. Second Edition

Penetration Testing. Presented by

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

External Supplier Control Requirements

Application Intrusion Detection

Penetration testing & Ethical Hacking. Security Week 2014

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Passive Vulnerability Detection

Software that provides secure access to technology, everywhere.

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Utility Mainframe System Administration Training Curriculum

CA OPS /MVS Event Management and Automation

Information Security Services

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Penetration Testing Report Client: Business Solutions June 15 th 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

PCI DSS, z/os and Keeping You from Becoming a News Headline

RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

CA OPS /MVS Event Management and Automation

Columbia University Web Security Standards and Practices. Objective and Scope

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Discovering passwords in the memory

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Thick Client Application Security

z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

THE TOP 4 CONTROLS.

Protecting against cyber threats and security breaches

Office of Inspector General

How To Protect Decd Information From Harm

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

External Penetration Assessment and Database Access Review

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Data Security Incident Response Plan. [Insert Organization Name]

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

ESKISP Conduct security testing, under supervision

Feedback Ferret. Security Incident Response Plan

External Supplier Control Requirements

FERPA: Data & Transport Security Best Practices

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

NETWORK PENETRATION TESTING

IBM Managed Security Services Vulnerability Scanning:

Incident Response Plan for PCI-DSS Compliance

Vulnerability Assessment & Compliance

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

Security Testing and Vulnerability Management Process. e-governance

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Passing PCI Compliance How to Address the Application Security Mandates

Database Security & Auditing

An Often Overlooked Security Hole in Enterprise Extender and Mainframe Networks By Stu Henderson and Peter Hager

Virtualization System Security

Information Security Policy

Information Technology Security Review April 16, 2012

Hacking Database for Owning your Data

New Security Options in DB2 for z/os Release 9 and 10

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Project 25 Security Services Overview

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

CA JCLCheck Workload Automation

Transcription:

Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson markw@rsmpartners.com Session Details: The Introduction

Agenda Introduction z/os Security Basics SAF RACF, ACF2 & TSS Resource Managers such as CICS, DB2, etc Hacking, Pen Testing and Ethical hacking, what s it all about? What is Vulnerability scanning? What are the Top Ten Audit issues seen? Is anyone interested in this stuff? Have mainframe systems ever been hacked? How have they been hacked? Questions

Introduction Full Day Workshop Session?????

Introduction Mark Wilson Technical Director at RSM Partners I am a mainframe technician with some knowledge of Mainframe Security I have been doing this for over 30 years (34 to be precise ) This is part one of seven hour long sessions on mainframe security Full details can be seen on the New Era Website: http://www.newera-info.com/new.html

This is where Mark Lives!

Objectives These sessions will give you an insight into what can happen to your system when you think you have it all covered The information is shared for your use and your use only to enhance the security of the systems you manage The information being shared is sensitive information and if in the wrong hands could do serious damage Hopefully I will show you that there is more to security than just a security product such as RACF, ACF2 and TSS!

z/os Security Basics

Reliability and Security A combination of z/os Software and System z hardware can provide: Confidentiality (not disclosure) Integrity (not alteration) Availability (not destruction) When configured correctly! Remember system z is no different to any other server if not configured correctly

Reliability and Security Buffer Overflow - not a real problem on z/os Address spaces and storage keys prevent applications from storing into someone else's storage Your ESM (RACF, ACF2 or TSS) can protect the complete system All access to the system should require authentication with your ESM A detailed audit trail can be created, but its optional Daemons are protected against modification and misuse Security critical programs must run in a controlled environment TCP/IP stacks, ports and network addresses can be protected using your ESM Can prevent rogue programs from taking over ports Protects system and network from insider attacks, modification and misuse

RACF and z/os Relationship Assumption 1: Assumes the Resource Manager is calling! Resource Manager (TSO, CICS, AM, HSM, etc.) Assumption 2: Assumes the Resource Manager does not override the decision made by RACF. Based on Profiles! (User, Group, Resource) MVS Assumption 3: Assumes correct/required profiles are defined to RACF? RACROUTE Interface RACF RACF Database or In-Storage Copy Assumption 4: Assume the default RC set in the CDT does not allow access when RC4 (profile not defined ) is handled as a RC0 (allow) versus RC8 (denied) Assumption 5: Assume what is in storage is correct!

Hacking, Pen Testing and Ethical hacking: what s it all about

Penetration Testing vs Hacking Who knows the difference? Well it depends on which way round you wear the baseball cap The good guys do penetration testing aka ethical hacking The bad guys do hacking

What is Penetration Testing? Wikipedia Definition: A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. What is it A security test with permission Uses techniques employed by the bad guys Designed not to disrupt your system Identify security issues to minimize the risk of an attacker compromising your system Basically we try to find holes in your system before somebody else does!

Who s been here before? How many of you have had your mainframe systems penetration tested? If you have how did it go? I have done many of these and have never failed to elevate my privileges! One customer was very concerned as they had had clean audits for the previous 3 years..

What s typically done? Two Phase Approach: Phase One Data Gathering zos RACF/TSS/ACF2 Phase Two Penetration Test

Data Gathering The following zos information is typically gathered: IPL Parameters for current IPL APF, Linklisted & LPA Datasets JES Spool & Checkpoint Datasets Page Datasets SMF Datasets Parmlib Datasets IPLPARM Datasets IODF Datasets Proclib Datasets ISPF Datasets (CLIST, REXX, etc.)

Data Gathering Gather the security information for the protection of the following: Datasets: APF, Linklisted & LPA Datasets JES Spool & Checkpoint Datasets Page Datasets SMF Datasets Parmlib Datasets IPLPARM Datasets IODF Datasets Proclib Datasets ISPF Datasets (CLIST, REXX, etc.) General Resources: SDSF, OPERCMDS, CONSOLE FACILITY, XFACILIT SURROGAT, TSOAUTH, plus many more

The Test This phase is using a standard userid (one without any privileges) The objective here is to probe the system and determine if it is possible to elevate privileges of your user or gain inappropriate access to resources and/or data There are many tests performed and no set scripts It just depends what you find!!

The Results In all of the tests undertaken so far we have always been able to elevate our privileges or prove that we can! We have seen everything from: Poor APF Library protection Poor SURROGAT profiles Poorly coded SVC s And many others.

Why do a penetration test? Systems at various times have been delivered misconfigured or with misguided documentation Default configuration do not address proper security The effects of this misconfiguration and advice generally last until someone finds them Make sure that it s you that finds these and not some-one else!

Why do a penetration test? Various ways to install new versions of z/os have been used over time We tend to migrate our RACF database with the operating system So a mistake made as far back as OS/390 2.10 may well be there on our RACF database at z/os 1.13 or even 2.1! It is not uncommon for system parameters and/or Usermods to be copied to the latest z/os release without a full appreciation of their impact

What is hacking? The same as the Penetration Test or Ethical Hack, but done by the bad guys and girls The biggest difference is that they have plenty of time. We have seen some hacks perpetrated over a two year period! Quite often in the system z world its from the inside out However, we have seen outside in attacks

What is vulnerability scanning?

What about z/os Based Vulnerabilities? What is a vulnerability? A weakness in z/os systems, that allows the exploitation of products from Independent Software Vendor (ISV) and/or in-house developed authorized interfaces (SVCs and PCs) as well as (APF) authorised applications Vulnerabilities can compromise all data on your system as well as the system itself Disrupt System Availability View and Modify Sensitive Information It can allow an Internal attacker to circumvent RACF, ACF2 or Top Secret s installation controls

Exploiting a Vulnerability An Exploit is a way of taking advantage of a software Vulnerability Bypassing the installation-security controls Gain unauthorised access to data without proper permission and Without any logging (SMF)

Is anyone interested in this stuff?

Do we really care? Is anyone really interested in hacking mainframes? Take a look here: http://mainframed767.tumblr.com/ And some Interesting discussion on Linkedin Mainframe Security Gurus Discussion Started: IBM and CA Technologies Exploitable Code Found Above Discussion Removed no longer available New Discussion Started: KRI's z/assure VAP validates that CA Technologies has mitigated their ACF2 Code Vulnerability

Do we really care? Yes we do. The crown jewels of many organisations reside or originate from our mainframe systems

Have Mainframe systems ever been hacked If so how was it done?

Can a Mainframe be hacked? Swedish Man Charged with Hacking IBM Mainframe & Stealing Money - Apr 16, 2013 -- Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of the Swedish Nordea bank, the Swedish public prosecutor said on Tuesday "This is the biggest investigation into data intrusion ever performed in Sweden," said public prosecutor Henrik Olin According to prosecutors, IBM mainframes belonging to Logica (who provide tax services to the Swedish government) and the bank were targeted in the attacks, which are said to have begun in 2010, and continued until April 2012 A large amount of data from companies and agencies was taken during the hack, including a large amount of personal data, such as personal identity numbers...

Can a mainframe be hacked? An employee of a large UK Bank charged with defrauding the bank of 2,000,000 (Sterling) Jailed for 7 years So far only 50% has been recovered So can mainframes be hacked? Yes they can and we need to take steps to prevent this happening!

Summary

It s a continuous process Success? Use the findings to your benefit to enhance your security posture. Education This session Attack (Optionally) Attack the system with discovery information. Knowledge Now you know what to do! Discover Discover the flaws in your system with the knowledge gained. Discovery

Summary Its not just about your ESM (RACF, ACF2 or TSS) You need a proactive security posture that checks and validates all of your security controls You need: Audits Penetration Testing/Ethical Hacking Vulnerability Scanning Education More importantly you need management and business support to be effective.. Otherwise you may end up in the evening news!

Questions

Contact Details Mark Wilson RSM Partners markw@rsmpartners.com